1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976
// SPDX-License-Identifier: MPL-2.0
//! **(NOTE: This module is experimental. Applications should not use it yet.)** This module
//! implements a fully linear PCP ("Probabilistically Checkable Proof") system based on
//! \[[BBC+19](https://eprint.iacr.org/2019/188), Theorem 4.3\].
//!
//! # Overview
//!
//! The proof system is comprised of three algorithms. The first, `prove`, is run by the prover in
//! order to generate a proof of a statement's validity. The second and third, `query` and
//! `decide`, are run by the verifier in order to check the proof. The proof asserts that the input
//! is an element of a language recognized by an arithmetic circuit. For example:
//!
//! ```
//! use prio::pcp::types::Boolean;
//! use prio::pcp::{decide, prove, query, Value};
//! use prio::field::{random_vector, FieldElement, Field64};
//!
//! // The prover generates a proof `pf` that its input `x` is a valid encoding
//! // of a boolean (either `true` or `false`). Both the input and proof are
//! // vectors over a finite field.
//! let input: Boolean<Field64> = Boolean::new(false);
//!
//! // The verifier chooses "joint randomness" that that will be used to
//! // generate and verify a proof of `x`'s validity. In proof systems like
//! // [BBC+19, Theorem 5.3], the verifier sends the prover a random challenge
//! // in the first round, which the prover uses to construct the proof.
//! let joint_rand = random_vector(input.joint_rand_len()).unwrap();
//!
//! // The prover and verifier choose local randomness it uses to check the proof.
//! let prove_rand = random_vector(input.prove_rand_len()).unwrap();
//! let query_rand = random_vector(input.query_rand_len()).unwrap();
//!
//! // The prover generates the proof.
//! let proof = prove(&input, &prove_rand, &joint_rand).unwrap();
//!
//! // The verifier queries the proof `pf` and input `x`, getting a
//! // "verification message" in response. It uses this message to decide if
//! // the input is valid.
//! let verifier = query(&input, &proof, &query_rand, &joint_rand).unwrap();
//! let res = decide(&input, &verifier).unwrap();
//! assert_eq!(res, true);
//! ```
//!
//! If an input is _not_ valid, then the verification step will fail with high probability:
//!
//! ```
//! use prio::pcp::types::Boolean;
//! use prio::pcp::{decide, prove, query, Value};
//! use prio::field::{random_vector, FieldElement, Field64};
//!
//! use std::convert::TryFrom;
//!
//! let input = Boolean::try_from(((), vec![Field64::from(23)].as_slice())).unwrap(); // Invalid input
//! let joint_rand = random_vector(input.joint_rand_len()).unwrap();
//! let prove_rand = random_vector(input.prove_rand_len()).unwrap();
//! let query_rand = random_vector(input.query_rand_len()).unwrap();
//! let proof = prove(&input, &prove_rand, &joint_rand).unwrap();
//! let verifier = query(&input, &proof, &query_rand, &joint_rand).unwrap();
//! let res = decide(&input, &verifier).unwrap();
//! assert_eq!(res, false);
//! ```
//!
//! The "fully linear" property of the proof system allows the protocol to be executed over
//! secret-shared data. In this setting, the prover uses an additive secret sharing scheme to
//! "split" its input and proof into a number of shares and distributes the shares among a set of
//! verifiers. Each verifier queries its input and proof share locally. One of the verifiers
//! collects the outputs and uses them to decide if the input was valid. This procedure allows the
//! verifiers to validate a user's input without ever seeing the input in the clear:
//!
//! ```
//! use prio::pcp::types::Boolean;
//! use prio::pcp::{decide, prove, query, Value, Proof, Verifier};
//! use prio::field::{random_vector, split_vector, FieldElement, Field64};
//!
//! use std::convert::TryFrom;
//!
//! // The prover encodes its input and splits it into two secret shares. It
//! // sends each share to two aggregators.
//! let input: Boolean<Field64> = Boolean::new(true);
//! let input_shares: Vec<Boolean<Field64>> = split_vector(input.as_slice(), 2)
//! .unwrap()
//! .into_iter()
//! .map(|data| Boolean::try_from((input.param(), data.as_slice())).unwrap())
//! .collect();
//!
//! let joint_rand = random_vector(input.joint_rand_len()).unwrap();
//! let prove_rand = random_vector(input.prove_rand_len()).unwrap();
//! let query_rand = random_vector(input.query_rand_len()).unwrap();
//!
//! // The prover generates a proof of its input's validity and splits the proof
//! // into two shares. It sends each share to one of two aggregators.
//! let proof = prove(&input, &prove_rand, &joint_rand).unwrap();
//! let proof_shares: Vec<Proof<Field64>> = split_vector(proof.as_slice(), 2)
//! .unwrap()
//! .into_iter()
//! .map(Proof::from)
//! .collect();
//!
//! // Each verifier queries its shares of the input and proof and sends its
//! // share of the verification message to the leader.
//! let verifier_shares = vec![
//! query(&input_shares[0], &proof_shares[0], &query_rand, &joint_rand).unwrap(),
//! query(&input_shares[1], &proof_shares[1], &query_rand, &joint_rand).unwrap(),
//! ];
//!
//! // The leader collects the verifier shares and decides if the input is valid.
//! let verifier = Verifier::try_from(verifier_shares.as_slice()).unwrap();
//! let res = decide(&input_shares[0], &verifier).unwrap();
//! assert_eq!(res, true);
//! ```
//!
//! Note that the secret sharing provided by [`crate::field::split_vector`] is not the most
//! efficient possible. A much more efficient secret sharing scheme is implemented in the
//! [`crate::vdaf`] module.
//!
//! The fully linear PCP system of [BBC+19, Theorem 4.3] applies to languages recognized by
//! arithmetic circuits over finite fields that have a particular structure. Namely, all gates in
//! the circuit are either affine (i.e., addition or scalar multiplication) or invoke a special
//! sub-circuit, called the "gadget", which may contain non-affine operations (i.e.,
//! multiplication). For example, the `Boolean` type uses the `Mul` gadget, an arity-2 circuit that
//! simply multiples its inputs and outputs the result.
//!
//! # References
//!
//! - \[GB17\] H. Corrigan-Gibbs and D. Boneh. "[Prio: Private, Robust, and Scalable Computation of
//! Aggregate Statistics.](https://crypto.stanford.edu/prio/paper.pdf)" NSDI 2017.
//! - \[BBC+19\] Boneh et al. "[Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear
//! PCPs.](https://eprint.iacr.org/2019/188)" CRYPTO 2019.
use crate::fft::{discrete_fourier_transform, discrete_fourier_transform_inv_finish, FftError};
use crate::field::{FieldElement, FieldError};
use crate::fp::log2;
use crate::pcp::types::TypeError;
use crate::polynomial::poly_eval;
use serde::{Deserialize, Serialize};
use std::any::Any;
use std::convert::TryFrom;
use std::fmt::Debug;
pub mod gadgets;
pub mod types;
/// Errors propagated by methods in this module.
//
// TODO(cjpatton) Consolidate the set of errors here. Lots of variants isn't super helpful.
#[derive(Debug, thiserror::Error)]
pub enum PcpError {
/// The caller of an arithmetic circuit provided the wrong number of inputs. This error may
/// occur when evaluating a validity circuit or gadget.
#[error("wrong number of inputs to arithmetic circuit")]
CircuitInLen,
/// The caller of an arithmetic circuit provided malformed input.
#[error("malformed input to circuit")]
CircuitIn(&'static str),
/// This error is returned by `collect` if the input slice is empty.
#[error("collect requires at least one input")]
CollectInLen,
/// This error is returned by `collect` if the two or more verifier shares have different
/// gadget arities.
#[error("collect inputs have mismatched gadget arity")]
CollectGadgetInLenMismatch,
/// Returned if an FFT operation propagates an error.
#[error("FFT error")]
Fft(#[from] FftError),
/// When evaluating a gadget on polynomials, this error is returned if the input polynomials
/// don't all have the same length.
#[error("gadget called on polynomials with different lengths")]
GadgetPolyInLen,
/// When evaluating a gadget on polynomials, this error is returned if the slice allocated for
/// the output polynomial is too small.
#[error("slice allocated for gadget output is too small")]
GadgetPolyOutLen,
/// Calling `query` returned an error.
#[error("query error: {0}")]
Query(&'static str),
/// Returned by `query` if one of the elements of the query randomness vector is invalid. An
/// element is invalid if using it to generate the verification message would result in a
/// privacy violation.
///
/// If this error is returned, the caller may generate fresh randomness and retry.
#[error("query error: invalid query randomness")]
QueryRandInvalid,
/// Calling `decide` returned an error.
#[error("decide error: {0}")]
Decide(&'static str),
/// The validity circuit was called with the wrong amount of randomness.
#[error("incorrect amount of randomness")]
ValidRandLen,
/// Encountered an error while evaluating a validity circuit.
#[error("failed to run validity circuit: {0}")]
Valid(&'static str),
/// Returned if a field operation encountered an error.
#[error("Field error")]
Field(#[from] FieldError),
/// Failure when calling getrandom().
#[error("getrandom: {0}")]
GetRandom(#[from] getrandom::Error),
}
/// A value of a certain type. Implementations of this trait specify an arithmetic circuit that
/// determines whether a given value is valid.
pub trait Value:
Sized
+ PartialEq
+ Eq
+ Debug
+ for<'a> TryFrom<(<Self as Value>::Param, &'a [Self::Field]), Error = TypeError>
{
/// The finite field used for this type.
type Field: FieldElement;
/// Parameters used to construct a value of this type from a vector of field elements.
type Param: Clone + Debug;
/// Evaluates the validity circuit on the given input (i.e., `self`) and returns the output.
/// `joint_rand` is the joint randomness shared by the prover and verifier. `g` is the sequence
/// of gadgets called by the circuit.
///
/// ```
/// use prio::pcp::types::Boolean;
/// use prio::pcp::Value;
/// use prio::field::{random_vector, FieldElement, Field64};
///
/// let x: Boolean<Field64> = Boolean::new(false);
/// let joint_rand = random_vector(x.joint_rand_len()).unwrap();
/// let v = x.valid(&mut x.gadget(), &joint_rand).unwrap();
/// assert_eq!(v, Field64::zero());
/// ```
fn valid(
&self,
gadgets: &mut Vec<Box<dyn Gadget<Self::Field>>>,
joint_rand: &[Self::Field],
) -> Result<Self::Field, PcpError>;
/// Returns a reference to the underlying data.
fn as_slice(&self) -> &[Self::Field];
/// The length of the random input used by both the prover and the verifier.
fn joint_rand_len(&self) -> usize;
/// The length of the random input consumed by the prover to generate a proof. This is the same
/// as the sum of the arity of each gadget in the validity circuit.
fn prove_rand_len(&self) -> usize;
/// The length of the random input consumed by the verifier to make queries against inputs and
/// proofs. This is the same as the number of gadgets in the validity circuit.
fn query_rand_len(&self) -> usize;
/// The number of calls to the gadget made when evaluating the validity circuit.
//
// TODO(cjpatton) Consider consolidating this and `gadget` into one call. The benefit would be
// that there is one less thing to worry about when implementing a Value<F>. We would need to
// extend Gadget<F> so that it tells you how many times it gets called.
fn valid_gadget_calls(&self) -> Vec<usize>;
/// Returns the sequence of gadgets associated with the validity circuit.
///
/// NOTE The construction of [BBC+19, Theorem 4.3] uses a single gadget rather than many. The
/// idea to generalize the proof system to allow multiple gadgets is discussed briefly in
/// [BBC+19, Remark 4.5], but no construction is given. The construction implemented here
/// requires security analysis.
fn gadget(&self) -> Vec<Box<dyn Gadget<Self::Field>>>;
/// Returns a copy of the associated type parameters for this value.
fn param(&self) -> Self::Param;
/// When verifying a proof over secret shared data, this method may be used to distinguish the
/// "leader" share from the others. This is useful, for example, when some of the gadget inputs
/// are constants used for both proof generation and verification.
///
/// ```
/// use prio::pcp::types::MeanVarUnsignedVector;
/// use prio::pcp::{decide, prove, query, Value, Proof, Verifier};
/// use prio::field::{random_vector, split_vector, FieldElement, Field64};
///
/// use std::convert::TryFrom;
///
/// let measurement = [1, 2, 3];
/// let bits = 8;
/// let input: MeanVarUnsignedVector<Field64> =
/// MeanVarUnsignedVector::new(bits, &measurement).unwrap();
/// let input_shares: Vec<MeanVarUnsignedVector<Field64>> = split_vector(input.as_slice(), 2)
/// .unwrap()
/// .into_iter()
/// .enumerate()
/// .map(|(i, data)| {
/// let mut share =
/// MeanVarUnsignedVector::try_from((input.param(), data.as_slice())).unwrap();
/// share.set_leader(i == 0);
/// share
/// })
/// .collect();
///
/// let joint_rand = random_vector(input.joint_rand_len()).unwrap();
/// let prove_rand = random_vector(input.prove_rand_len()).unwrap();
/// let query_rand = random_vector(input.query_rand_len()).unwrap();
///
/// let proof = prove(&input, &prove_rand, &joint_rand).unwrap();
/// let proof_shares: Vec<Proof<Field64>> = split_vector(proof.as_slice(), 2)
/// .unwrap()
/// .into_iter()
/// .map(Proof::from)
/// .collect();
///
/// let verifier_shares = vec![
/// query(&input_shares[0], &proof_shares[0], &query_rand, &joint_rand).unwrap(),
/// query(&input_shares[1], &proof_shares[1], &query_rand, &joint_rand).unwrap(),
/// ];
///
/// let verifier = Verifier::try_from(verifier_shares.as_slice()).unwrap();
/// let res = decide(&input_shares[0], &verifier).unwrap();
/// assert_eq!(res, true);
/// ```
fn set_leader(&mut self, _is_leader: bool) {
// No-op by default.
}
}
/// A gadget, a non-affine arithmetic circuit that is called when evaluating a validity circuit.
//
// TODO(cjpatton) Consider extending this API with a `Param` associated type and have it implement
// a constructor from an instance of `Param` and the number of times the gadget gets called.
pub trait Gadget<F: FieldElement> {
/// Evaluates the gadget on input `inp` and returns the output.
fn call(&mut self, inp: &[F]) -> Result<F, PcpError>;
/// Evaluate the gadget on input of a sequence of polynomials. The output is written to `outp`.
fn call_poly(&mut self, outp: &mut [F], inp: &[Vec<F>]) -> Result<(), PcpError>;
/// Returns the arity of the gadget. This is the length of `inp` passed to `call` or
/// `call_poly`.
fn arity(&self) -> usize;
/// Returns the circuit's arithmetic degree. This determines the minimum length the `outp`
/// buffer passed to `call_poly`.
fn degree(&self) -> usize;
/// This call is used to downcast a `Box<dyn Gadget<F>>` to a concrete type.
fn as_any(&mut self) -> &mut dyn Any;
}
/// Generate a proof of an input's validity.
pub fn prove<V: Value>(
input: &V,
prove_rand: &[V::Field],
joint_rand: &[V::Field],
) -> Result<Proof<V::Field>, PcpError> {
let gadget_calls = input.valid_gadget_calls();
let mut prove_rand_len = 0;
let mut shim = input
.gadget()
.into_iter()
.enumerate()
.map(|(idx, inner)| {
let inner_arity = inner.arity();
if prove_rand_len + inner_arity > prove_rand.len() {
return Err(PcpError::Query("short prove randomness"));
}
let gadget = Box::new(ProveShimGadget::new(
inner,
gadget_calls[idx],
&prove_rand[prove_rand_len..prove_rand_len + inner_arity],
)?) as Box<dyn Gadget<V::Field>>;
prove_rand_len += inner_arity;
Ok(gadget)
})
.collect::<Result<Vec<_>, PcpError>>()?;
// Create a buffer for storing the proof. The buffer is longer than the proof itself; the extra
// length is to accommodate the computation of each gadget polynomial.
let data_len = (0..shim.len())
.map(|idx| {
shim[idx].arity() + shim[idx].degree() * (1 + gadget_calls[idx]).next_power_of_two()
})
.sum();
let mut data = vec![V::Field::zero(); data_len];
// Run the validity circuit with a sequence of "shim" gadgets that record the value of each
// input wire of each gadget evaluation. These values are used to construct the wire
// polynomials for each gadget in the next step.
let _ = input.valid(&mut shim, joint_rand);
// Fill the buffer with the proof. `proof_len` keeps track of the amount of data written to the
// buffer so far.
let mut proof_len = 0;
for idx in 0..shim.len() {
let gadget = shim[idx]
.as_any()
.downcast_mut::<ProveShimGadget<V::Field>>()
.unwrap();
// Interpolate the wire polynomials `f[0], ..., f[g_arity-1]` from the input wires of each
// evaluation of the gadget.
let m = (1 + gadget_calls[idx]).next_power_of_two();
let m_inv =
V::Field::from(<<V as Value>::Field as FieldElement>::Integer::try_from(m).unwrap())
.inv();
let mut f = vec![vec![V::Field::zero(); m]; gadget.arity()];
for wire in 0..gadget.arity() {
discrete_fourier_transform(&mut f[wire], &gadget.f_vals[wire], m)?;
discrete_fourier_transform_inv_finish(&mut f[wire], m, m_inv);
// The first point on each wire polynomial is a random value chosen by the prover. This
// point is stored in the proof so that the verifier can reconstruct the wire
// polynomials.
data[proof_len + wire] = gadget.f_vals[wire][0];
}
// Construct the gadget polynomial `G(f[0], ..., f[g_arity-1])` and append it to `data`.
gadget.call_poly(&mut data[proof_len + gadget.arity()..], &f)?;
proof_len += gadget.arity() + gadget.degree() * (m - 1) + 1;
}
// Truncate the buffer to the size of the proof.
data.truncate(proof_len);
Ok(Proof { data })
}
// A "shim" gadget used during proof generation to record the input wires each time a gadget is
// evaluated.
struct ProveShimGadget<F: FieldElement> {
inner: Box<dyn Gadget<F>>,
/// Points at which the wire polynomials are interpolated.
f_vals: Vec<Vec<F>>,
/// The number of times the gadget has been called so far.
ct: usize,
}
impl<F: FieldElement> ProveShimGadget<F> {
fn new(
inner: Box<dyn Gadget<F>>,
gadget_calls: usize,
prove_rand: &[F],
) -> Result<Self, PcpError> {
let mut f_vals = vec![vec![F::zero(); 1 + gadget_calls]; inner.arity()];
#[allow(clippy::needless_range_loop)]
for wire in 0..f_vals.len() {
// Choose a random field element as the first point on the wire polynomial.
f_vals[wire][0] = prove_rand[wire];
}
Ok(Self {
inner,
f_vals,
ct: 1,
})
}
}
impl<F: FieldElement> Gadget<F> for ProveShimGadget<F> {
fn call(&mut self, inp: &[F]) -> Result<F, PcpError> {
#[allow(clippy::needless_range_loop)]
for wire in 0..inp.len() {
self.f_vals[wire][self.ct] = inp[wire];
}
self.ct += 1;
self.inner.call(inp)
}
fn call_poly(&mut self, outp: &mut [F], inp: &[Vec<F>]) -> Result<(), PcpError> {
self.inner.call_poly(outp, inp)
}
fn arity(&self) -> usize {
self.inner.arity()
}
fn degree(&self) -> usize {
self.inner.degree()
}
fn as_any(&mut self) -> &mut dyn Any {
self
}
}
/// The output of `prove`, a proof of an input's validity.
#[derive(Clone, Debug)]
pub struct Proof<F: FieldElement> {
pub(crate) data: Vec<F>,
}
impl<F: FieldElement> Proof<F> {
/// Returns a reference to the underlying data.
pub fn as_slice(&self) -> &[F] {
&self.data
}
}
impl<F: FieldElement> From<Vec<F>> for Proof<F> {
fn from(data: Vec<F>) -> Self {
Self { data }
}
}
impl<F: FieldElement> From<Proof<F>> for Vec<u8> {
fn from(proof: Proof<F>) -> Self {
F::slice_into_byte_vec(&proof.data)
}
}
/// Generate a verifier message for an input and proof (or the verifier share for an input share
/// and proof share).
///
/// Parameters:
/// * `input` is the input.
/// * `proof` is the proof.
/// * `query_rand` is the verifier's randomness.
/// * `joint_rand` is the randomness shared by the prover and verifier.
pub fn query<V: Value>(
input: &V,
proof: &Proof<V::Field>,
query_rand: &[V::Field],
joint_rand: &[V::Field],
) -> Result<Verifier<V::Field>, PcpError> {
let gadget_calls = input.valid_gadget_calls();
let mut proof_len = 0;
let mut shim = input
.gadget()
.into_iter()
.enumerate()
.map(|(idx, gadget)| {
if idx >= query_rand.len() {
return Err(PcpError::Query("short query randomness"));
}
let gadget_degree = gadget.degree();
let gadget_arity = gadget.arity();
let m = (1 + gadget_calls[idx]).next_power_of_two();
let r = query_rand[idx];
// Make sure the query randomness isn't a root of unity. Evaluating the gadget
// polynomial at any of these points would be a privacy violation, since these points
// were used by the prover to construct the wire polynomials.
if r.pow(<<V as Value>::Field as FieldElement>::Integer::try_from(m).unwrap())
== V::Field::one()
{
return Err(PcpError::QueryRandInvalid);
}
// Compute the length of the sub-proof corresponding to the `idx`-th gadget.
let next_len = gadget_arity + gadget_degree * (m - 1) + 1;
if proof_len + next_len > proof.data.len() {
return Err(PcpError::Query("short proof"));
}
let proof_data = &proof.data[proof_len..proof_len + next_len];
proof_len += next_len;
Ok(Box::new(QueryShimGadget::new(
gadget,
r,
proof_data,
gadget_calls[idx],
)?) as Box<dyn Gadget<V::Field>>)
})
.collect::<Result<Vec<_>, _>>()?;
if proof_len < proof.data.len() {
return Err(PcpError::Query("long proof"));
}
if query_rand.len() > shim.len() {
return Err(PcpError::Query("long joint randomness"));
}
// Create a buffer for the verifier data. This includes the output of the validity circuit and,
// for each gadget `shim[idx].inner`, the wire polynomials evaluated at the query randomness
// `query_rand[idx]` and the gadget polynomial evaluated at `query_rand[idx]`.
let data_len = 1
+ (0..shim.len())
.map(|idx| shim[idx].arity() + 1)
.sum::<usize>();
let mut data = Vec::with_capacity(data_len);
// Run the validity circuit with a sequence of "shim" gadgets that record the inputs to each
// wire for each gadget call. Record the output of the circuit and append it to the verifier
// message.
//
// NOTE The proof of [BBC+19, Theorem 4.3] assumes that the output of the validity circuit is
// equal to the output of the last gadget evaluation. Here we relax this assumption. This
// should be OK, since it's possible to transform any circuit into one for which this is true.
// (Needs security analysis.)
let validity = input.valid(&mut shim, joint_rand)?;
data.push(validity);
// Fill the buffer with the verifier message.
for idx in 0..shim.len() {
let r = query_rand[idx];
let gadget = shim[idx]
.as_any()
.downcast_ref::<QueryShimGadget<V::Field>>()
.unwrap();
// Reconstruct the wire polynomials `f[0], ..., f[g_arity-1]` and evaluate each wire
// polynomial at query randomness `r`.
let m = (1 + gadget_calls[idx]).next_power_of_two();
let m_inv =
V::Field::from(<<V as Value>::Field as FieldElement>::Integer::try_from(m).unwrap())
.inv();
let mut f = vec![V::Field::zero(); m];
for wire in 0..gadget.arity() {
discrete_fourier_transform(&mut f, &gadget.f_vals[wire], m)?;
discrete_fourier_transform_inv_finish(&mut f, m, m_inv);
data.push(poly_eval(&f, r));
}
// Add the value of the gadget polynomial evaluated at `r`.
data.push(gadget.p_at_r);
}
Ok(Verifier { data })
}
// A "shim" gadget used during proof verification to record the points at which the intermediate
// proof polynomials are evaluated.
struct QueryShimGadget<F: FieldElement> {
inner: Box<dyn Gadget<F>>,
/// Points at which intermediate proof polynomials are interpolated.
f_vals: Vec<Vec<F>>,
/// Points at which the gadget polynomial is interpolated.
p_vals: Vec<F>,
/// The gadget polynomial evaluated on a random input `r`.
p_at_r: F,
/// Used to compute an index into `p_val`.
step: usize,
/// The number of times the gadget has been called so far.
ct: usize,
}
impl<F: FieldElement> QueryShimGadget<F> {
fn new(
inner: Box<dyn Gadget<F>>,
r: F,
proof_data: &[F],
gadget_calls: usize,
) -> Result<Self, PcpError> {
let gadget_degree = inner.degree();
let gadget_arity = inner.arity();
let m = (1 + gadget_calls).next_power_of_two();
let p = m * gadget_degree;
// Each call to this gadget records the values at which intermediate proof polynomials were
// interpolated. The first point was a random value chosen by the prover and transmitted in
// the proof.
let mut f_vals = vec![vec![F::zero(); 1 + gadget_calls]; gadget_arity];
for wire in 0..gadget_arity {
f_vals[wire][0] = proof_data[wire];
}
// Evaluate the gadget polynomial at roots of unity.
let size = p.next_power_of_two();
let mut p_vals = vec![F::zero(); size];
discrete_fourier_transform(&mut p_vals, &proof_data[gadget_arity..], size)?;
// The step is used to compute the element of `p_val` that will be returned by a call to
// the gadget.
let step = (1 << (log2(p as u128) - log2(m as u128))) as usize;
// Evaluate the gadget polynomial `p` at query randomness `r`.
let p_at_r = poly_eval(&proof_data[gadget_arity..], r);
Ok(Self {
inner,
f_vals,
p_vals,
p_at_r,
step,
ct: 1,
})
}
}
impl<F: FieldElement> Gadget<F> for QueryShimGadget<F> {
fn call(&mut self, inp: &[F]) -> Result<F, PcpError> {
#[allow(clippy::needless_range_loop)]
for wire in 0..inp.len() {
self.f_vals[wire][self.ct] = inp[wire];
}
let outp = self.p_vals[self.ct * self.step];
self.ct += 1;
Ok(outp)
}
fn call_poly(&mut self, _outp: &mut [F], _inp: &[Vec<F>]) -> Result<(), PcpError> {
panic!("no-op");
}
fn arity(&self) -> usize {
self.inner.arity()
}
fn degree(&self) -> usize {
self.inner.degree()
}
fn as_any(&mut self) -> &mut dyn Any {
self
}
}
/// The output of `query`, the verifier message generated for a proof.
#[derive(Clone, Debug, Serialize, Deserialize)]
pub struct Verifier<F> {
data: Vec<F>,
}
impl<F: FieldElement> Verifier<F> {
/// Returns a reference to the underlying data. The first element of the output is the output
/// of the validity circuit. The remainder is a sequence of chunks, where the `idx`-th chunk
/// corresponds to the `idx`-th gadget for the validity circuit. The last element of a chunk is
/// the gadget polynomial evaluated on a random input `r`; the rest are the intermediate proof
/// polynomials evaluated at `r`.
pub fn as_slice(&self) -> &[F] {
&self.data
}
}
impl<F: FieldElement> From<Vec<F>> for Verifier<F> {
fn from(data: Vec<F>) -> Self {
Self { data }
}
}
impl<F: FieldElement> TryFrom<&[Verifier<F>]> for Verifier<F> {
type Error = PcpError;
/// Returns the verifier corresponding to a sequence of verifier shares.
fn try_from(verifier_shares: &[Verifier<F>]) -> Result<Verifier<F>, PcpError> {
if verifier_shares.is_empty() {
return Err(PcpError::CollectInLen);
}
let mut verifier = Verifier {
data: vec![F::zero(); verifier_shares[0].data.len()],
};
for verifier_share in verifier_shares {
if verifier_share.data.len() != verifier.data.len() {
return Err(PcpError::CollectGadgetInLenMismatch);
}
for j in 0..verifier.data.len() {
verifier.data[j] += verifier_share.data[j];
}
}
Ok(verifier)
}
}
/// Decide if the input (or input share) is valid using the given verifier.
pub fn decide<V: Value>(input: &V, verifier: &Verifier<V::Field>) -> Result<bool, PcpError> {
let mut gadgets = input.gadget();
if verifier.data.is_empty() {
return Err(PcpError::Decide("zero-length verifier"));
}
// Check if the output of the circuit is 0.
if verifier.data[0] != V::Field::zero() {
return Ok(false);
}
// Check that each of the proof polynomials are well-formed.
let mut verifier_len = 1;
#[allow(clippy::needless_range_loop)]
for idx in 0..gadgets.len() {
let next_len = 1 + gadgets[idx].arity();
if verifier_len + next_len > verifier.data.len() {
return Err(PcpError::Decide("short verifier"));
}
let e = gadgets[idx].call(&verifier.data[verifier_len..verifier_len + next_len - 1])?;
if e != verifier.data[verifier_len + next_len - 1] {
return Ok(false);
}
verifier_len += next_len;
}
if verifier_len != verifier.data.len() {
return Err(PcpError::Decide("long verifier"));
}
Ok(true)
}
#[cfg(test)]
mod tests {
use super::*;
use crate::field::{random_vector, split_vector, Field126};
use crate::pcp::gadgets::{Mul, PolyEval};
use crate::pcp::types::Boolean;
use crate::pcp::types::TypeError;
use crate::polynomial::poly_range_check;
// Simple integration test for the core PCP logic. You'll find more extensive unit tests for
// each implemented data type in src/types.rs.
#[test]
fn test_pcp() {
type F = Field126;
type T = TestValue<F>;
const NUM_SHARES: usize = 2;
let inp = F::from(3);
let x: T = TestValue::new(inp);
let x_par = x.param();
let x_shares: Vec<T> = split_vector(x.as_slice(), NUM_SHARES)
.unwrap()
.into_iter()
.enumerate()
.map(|(i, data)| {
let mut share = T::try_from((x_par, data.as_slice())).unwrap();
share.set_leader(i == 0);
share
})
.collect();
let joint_rand = random_vector(x.joint_rand_len()).unwrap();
let prove_rand = random_vector(x.prove_rand_len()).unwrap();
let query_rand = random_vector(x.query_rand_len()).unwrap();
let pf = prove(&x, &prove_rand, &joint_rand).unwrap();
let pf_shares: Vec<Proof<F>> = split_vector(pf.as_slice(), NUM_SHARES)
.unwrap()
.into_iter()
.map(Proof::from)
.collect();
let vf_shares: Vec<Verifier<F>> = (0..NUM_SHARES)
.map(|i| query(&x_shares[i], &pf_shares[i], &query_rand, &joint_rand).unwrap())
.collect();
let vf = Verifier::try_from(vf_shares.as_slice()).unwrap();
assert!(decide(&x, &vf).unwrap());
}
#[test]
fn test_decide() {
let x: Boolean<Field126> = Boolean::new(true);
let joint_rand = random_vector(x.joint_rand_len()).unwrap();
let prove_rand = random_vector(x.prove_rand_len()).unwrap();
let query_rand = random_vector(x.query_rand_len()).unwrap();
let ok_vf = query(
&x,
&prove(&x, &prove_rand, &joint_rand).unwrap(),
&query_rand,
&joint_rand,
)
.unwrap();
assert!(decide(&x, &ok_vf).is_ok());
let vf_len = ok_vf.as_slice().len();
let bad_vf = Verifier::from(ok_vf.as_slice()[..vf_len - 1].to_vec());
assert!(decide(&x, &bad_vf).is_err());
let bad_vf = Verifier::from(ok_vf.as_slice()[..2].to_vec());
assert!(decide(&x, &bad_vf).is_err());
let bad_vf = Verifier::from(vec![]);
assert!(decide(&x, &bad_vf).is_err());
}
/// A toy type used for testing the functionality in this module. Valid inputs of this type
/// consist of a pair of field elements `(x, y)` where `2 <= x < 5` and `x^3 == y`.
#[derive(Debug, PartialEq, Eq)]
pub struct TestValue<F: FieldElement> {
data: Vec<F>, // The encoded input
}
impl<F: FieldElement> TestValue<F> {
pub fn new(inp: F) -> Self {
Self {
data: vec![inp, inp * inp * inp],
}
}
}
impl<F: FieldElement> Value for TestValue<F> {
type Field = F;
type Param = ();
fn valid(&self, g: &mut Vec<Box<dyn Gadget<F>>>, joint_rand: &[F]) -> Result<F, PcpError> {
if joint_rand.len() != self.joint_rand_len() {
return Err(PcpError::ValidRandLen);
}
if self.data.len() != 2 {
return Err(PcpError::CircuitInLen);
}
let r = joint_rand[0];
let mut res = F::zero();
// Check that `data[0]^3 == data[1]`.
let mut inp = [self.data[0], self.data[0]];
inp[0] = g[0].call(&inp)?;
inp[0] = g[0].call(&inp)?;
let x3_diff = inp[0] - self.data[1];
res += r * x3_diff;
// Check that `data[0]` is in the correct range.
let x_checked = g[1].call(&[self.data[0]])?;
res += (r * r) * x_checked;
Ok(res)
}
fn valid_gadget_calls(&self) -> Vec<usize> {
vec![2, 1]
}
fn joint_rand_len(&self) -> usize {
1
}
fn prove_rand_len(&self) -> usize {
3
}
fn query_rand_len(&self) -> usize {
2
}
fn gadget(&self) -> Vec<Box<dyn Gadget<F>>> {
vec![
Box::new(Mul::new(2)),
Box::new(PolyEval::new(poly_range_check(2, 5), 1)),
]
}
fn as_slice(&self) -> &[F] {
&self.data
}
fn param(&self) -> Self::Param {}
}
impl<F: FieldElement> TryFrom<((), &[F])> for TestValue<F> {
type Error = TypeError;
fn try_from(val: ((), &[F])) -> Result<Self, TypeError> {
Ok(Self {
data: val.1.to_vec(),
})
}
}
}